Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
08c44d1a75249042fbe0bc3e51b9a920N.exe
Resource
win7-20240729-en
General
-
Target
08c44d1a75249042fbe0bc3e51b9a920N.exe
-
Size
96KB
-
MD5
08c44d1a75249042fbe0bc3e51b9a920
-
SHA1
6839c9eb592d17f7dee22a46ead58aa4b6c1eb82
-
SHA256
448b1d4924c92b17a3c120875e623a6af0c0fca822df9f749dd56a8349ef91a3
-
SHA512
031340d9f2e77654a3d11b1964b32e104cee2d96a09e8255381e735fd86d08c4d18690c2905e572c1b248245b2dd46760174e73c84f7e1b1a9c08e222b827fd1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qP1hvZo66Ox4oq2SQwfTrp:ymb3NkkiQ3mdBjFIj+qNhvZuHQYfw4jr
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
resource yara_rule behavioral1/memory/2504-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1824-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1272-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/692-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1168-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1112-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/812-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1072-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3008 lfflxrx.exe 2312 5rflrrx.exe 2432 tnnbbn.exe 2856 3jvvj.exe 2184 vpddp.exe 1964 7xrxfff.exe 2964 9btbth.exe 2872 hbtbth.exe 2676 pjdpd.exe 2288 rlflfll.exe 1072 rlxxffx.exe 812 nhtbbh.exe 2828 3nhtbb.exe 1112 3pjdp.exe 1168 1jdjv.exe 692 rrfflrx.exe 1272 rfxlxfx.exe 2932 nnhbnh.exe 2092 nnhnbh.exe 1268 5dppd.exe 2052 dvjdd.exe 2580 fxfrrxf.exe 1872 ffxlflr.exe 1824 bttbnt.exe 2524 5thnhh.exe 3012 djvdp.exe 2792 jdvvd.exe 896 rrrlxxf.exe 880 lxlrllx.exe 2264 tnhhbh.exe 3004 tnntbh.exe 2000 jjdjp.exe 1916 dpjjp.exe 1592 lfrxrfr.exe 2704 frrlxrf.exe 2184 1tbnnb.exe 2624 1bhhth.exe 2876 nhtthh.exe 2692 vpjvd.exe 2024 dpjpd.exe 1156 dpddj.exe 800 5xrxxxf.exe 2636 9rlrlxf.exe 2616 lxlrfll.exe 1340 ttntnb.exe 2804 bhnhhh.exe 1192 jdpdd.exe 2840 ppdjv.exe 320 pjdvd.exe 2956 7lfrrlx.exe 2572 fxfrxrx.exe 2216 xllfllr.exe 2232 9btbhh.exe 1268 nthbhh.exe 544 bbttbh.exe 448 vpjvp.exe 1232 7djpv.exe 1872 rflrxfl.exe 608 ffxxfrx.exe 2120 lfxffrf.exe 736 nnbbtt.exe 1040 tnbtbh.exe 1968 jvjjp.exe 1104 7jpjj.exe -
resource yara_rule behavioral1/memory/2504-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1964-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1964-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1824-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1272-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/692-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1168-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1112-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/812-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1072-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-78-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 3008 2504 08c44d1a75249042fbe0bc3e51b9a920N.exe 30 PID 2504 wrote to memory of 3008 2504 08c44d1a75249042fbe0bc3e51b9a920N.exe 30 PID 2504 wrote to memory of 3008 2504 08c44d1a75249042fbe0bc3e51b9a920N.exe 30 PID 2504 wrote to memory of 3008 2504 08c44d1a75249042fbe0bc3e51b9a920N.exe 30 PID 3008 wrote to memory of 2312 3008 lfflxrx.exe 31 PID 3008 wrote to memory of 2312 3008 lfflxrx.exe 31 PID 3008 wrote to memory of 2312 3008 lfflxrx.exe 31 PID 3008 wrote to memory of 2312 3008 lfflxrx.exe 31 PID 2312 wrote to memory of 2432 2312 5rflrrx.exe 32 PID 2312 wrote to memory of 2432 2312 5rflrrx.exe 32 PID 2312 wrote to memory of 2432 2312 5rflrrx.exe 32 PID 2312 wrote to memory of 2432 2312 5rflrrx.exe 32 PID 2432 wrote to memory of 2856 2432 tnnbbn.exe 33 PID 2432 wrote to memory of 2856 2432 tnnbbn.exe 33 PID 2432 wrote to memory of 2856 2432 tnnbbn.exe 33 PID 2432 wrote to memory of 2856 2432 tnnbbn.exe 33 PID 2856 wrote to memory of 2184 2856 3jvvj.exe 65 PID 2856 wrote to memory of 2184 2856 3jvvj.exe 65 PID 2856 wrote to memory of 2184 2856 3jvvj.exe 65 PID 2856 wrote to memory of 2184 2856 3jvvj.exe 65 PID 2184 wrote to memory of 1964 2184 vpddp.exe 35 PID 2184 wrote to memory of 1964 2184 vpddp.exe 35 PID 2184 wrote to memory of 1964 2184 vpddp.exe 35 PID 2184 wrote to memory of 1964 2184 vpddp.exe 35 PID 1964 wrote to memory of 2964 1964 7xrxfff.exe 36 PID 1964 wrote to memory of 2964 1964 7xrxfff.exe 36 PID 1964 wrote to memory of 2964 1964 7xrxfff.exe 36 PID 1964 wrote to memory of 2964 1964 7xrxfff.exe 36 PID 2964 wrote to memory of 2872 2964 9btbth.exe 37 PID 2964 wrote to memory of 2872 2964 9btbth.exe 37 PID 2964 wrote to memory of 2872 2964 9btbth.exe 37 PID 2964 wrote to memory of 2872 2964 9btbth.exe 37 PID 2872 wrote to memory of 2676 2872 hbtbth.exe 38 PID 2872 wrote to memory of 2676 2872 hbtbth.exe 38 PID 2872 wrote to memory of 2676 2872 hbtbth.exe 38 PID 2872 wrote to memory of 2676 2872 hbtbth.exe 38 PID 2676 wrote to memory of 2288 2676 pjdpd.exe 39 PID 2676 wrote to memory of 2288 2676 pjdpd.exe 39 PID 2676 wrote to memory of 2288 2676 pjdpd.exe 39 PID 2676 wrote to memory of 2288 2676 pjdpd.exe 39 PID 2288 wrote to memory of 1072 2288 rlflfll.exe 40 PID 2288 wrote to memory of 1072 2288 rlflfll.exe 40 PID 2288 wrote to memory of 1072 2288 rlflfll.exe 40 PID 2288 wrote to memory of 1072 2288 rlflfll.exe 40 PID 1072 wrote to memory of 812 1072 rlxxffx.exe 41 PID 1072 wrote to memory of 812 1072 rlxxffx.exe 41 PID 1072 wrote to memory of 812 1072 rlxxffx.exe 41 PID 1072 wrote to memory of 812 1072 rlxxffx.exe 41 PID 812 wrote to memory of 2828 812 nhtbbh.exe 42 PID 812 wrote to memory of 2828 812 nhtbbh.exe 42 PID 812 wrote to memory of 2828 812 nhtbbh.exe 42 PID 812 wrote to memory of 2828 812 nhtbbh.exe 42 PID 2828 wrote to memory of 1112 2828 3nhtbb.exe 43 PID 2828 wrote to memory of 1112 2828 3nhtbb.exe 43 PID 2828 wrote to memory of 1112 2828 3nhtbb.exe 43 PID 2828 wrote to memory of 1112 2828 3nhtbb.exe 43 PID 1112 wrote to memory of 1168 1112 3pjdp.exe 44 PID 1112 wrote to memory of 1168 1112 3pjdp.exe 44 PID 1112 wrote to memory of 1168 1112 3pjdp.exe 44 PID 1112 wrote to memory of 1168 1112 3pjdp.exe 44 PID 1168 wrote to memory of 692 1168 1jdjv.exe 45 PID 1168 wrote to memory of 692 1168 1jdjv.exe 45 PID 1168 wrote to memory of 692 1168 1jdjv.exe 45 PID 1168 wrote to memory of 692 1168 1jdjv.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c44d1a75249042fbe0bc3e51b9a920N.exe"C:\Users\Admin\AppData\Local\Temp\08c44d1a75249042fbe0bc3e51b9a920N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\lfflxrx.exec:\lfflxrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\5rflrrx.exec:\5rflrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\tnnbbn.exec:\tnnbbn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\3jvvj.exec:\3jvvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\vpddp.exec:\vpddp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\7xrxfff.exec:\7xrxfff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\9btbth.exec:\9btbth.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\hbtbth.exec:\hbtbth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\pjdpd.exec:\pjdpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\rlflfll.exec:\rlflfll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\rlxxffx.exec:\rlxxffx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\nhtbbh.exec:\nhtbbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\3nhtbb.exec:\3nhtbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\3pjdp.exec:\3pjdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\1jdjv.exec:\1jdjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\rrfflrx.exec:\rrfflrx.exe17⤵
- Executes dropped EXE
PID:692 -
\??\c:\rfxlxfx.exec:\rfxlxfx.exe18⤵
- Executes dropped EXE
PID:1272 -
\??\c:\nnhbnh.exec:\nnhbnh.exe19⤵
- Executes dropped EXE
PID:2932 -
\??\c:\nnhnbh.exec:\nnhnbh.exe20⤵
- Executes dropped EXE
PID:2092 -
\??\c:\5dppd.exec:\5dppd.exe21⤵
- Executes dropped EXE
PID:1268 -
\??\c:\dvjdd.exec:\dvjdd.exe22⤵
- Executes dropped EXE
PID:2052 -
\??\c:\fxfrrxf.exec:\fxfrrxf.exe23⤵
- Executes dropped EXE
PID:2580 -
\??\c:\ffxlflr.exec:\ffxlflr.exe24⤵
- Executes dropped EXE
PID:1872 -
\??\c:\bttbnt.exec:\bttbnt.exe25⤵
- Executes dropped EXE
PID:1824 -
\??\c:\5thnhh.exec:\5thnhh.exe26⤵
- Executes dropped EXE
PID:2524 -
\??\c:\djvdp.exec:\djvdp.exe27⤵
- Executes dropped EXE
PID:3012 -
\??\c:\jdvvd.exec:\jdvvd.exe28⤵
- Executes dropped EXE
PID:2792 -
\??\c:\rrrlxxf.exec:\rrrlxxf.exe29⤵
- Executes dropped EXE
PID:896 -
\??\c:\lxlrllx.exec:\lxlrllx.exe30⤵
- Executes dropped EXE
PID:880 -
\??\c:\tnhhbh.exec:\tnhhbh.exe31⤵
- Executes dropped EXE
PID:2264 -
\??\c:\tnntbh.exec:\tnntbh.exe32⤵
- Executes dropped EXE
PID:3004 -
\??\c:\jjdjp.exec:\jjdjp.exe33⤵
- Executes dropped EXE
PID:2000 -
\??\c:\dpjjp.exec:\dpjjp.exe34⤵
- Executes dropped EXE
PID:1916 -
\??\c:\lfrxrfr.exec:\lfrxrfr.exe35⤵
- Executes dropped EXE
PID:1592 -
\??\c:\frrlxrf.exec:\frrlxrf.exe36⤵
- Executes dropped EXE
PID:2704 -
\??\c:\1tbnnb.exec:\1tbnnb.exe37⤵
- Executes dropped EXE
PID:2184 -
\??\c:\1bhhth.exec:\1bhhth.exe38⤵
- Executes dropped EXE
PID:2624 -
\??\c:\nhtthh.exec:\nhtthh.exe39⤵
- Executes dropped EXE
PID:2876 -
\??\c:\vpjvd.exec:\vpjvd.exe40⤵
- Executes dropped EXE
PID:2692 -
\??\c:\dpjpd.exec:\dpjpd.exe41⤵
- Executes dropped EXE
PID:2024 -
\??\c:\dpddj.exec:\dpddj.exe42⤵
- Executes dropped EXE
PID:1156 -
\??\c:\5xrxxxf.exec:\5xrxxxf.exe43⤵
- Executes dropped EXE
PID:800 -
\??\c:\9rlrlxf.exec:\9rlrlxf.exe44⤵
- Executes dropped EXE
PID:2636 -
\??\c:\lxlrfll.exec:\lxlrfll.exe45⤵
- Executes dropped EXE
PID:2616 -
\??\c:\ttntnb.exec:\ttntnb.exe46⤵
- Executes dropped EXE
PID:1340 -
\??\c:\bhnhhh.exec:\bhnhhh.exe47⤵
- Executes dropped EXE
PID:2804 -
\??\c:\jdpdd.exec:\jdpdd.exe48⤵
- Executes dropped EXE
PID:1192 -
\??\c:\ppdjv.exec:\ppdjv.exe49⤵
- Executes dropped EXE
PID:2840 -
\??\c:\pjdvd.exec:\pjdvd.exe50⤵
- Executes dropped EXE
PID:320 -
\??\c:\7lfrrlx.exec:\7lfrrlx.exe51⤵
- Executes dropped EXE
PID:2956 -
\??\c:\fxfrxrx.exec:\fxfrxrx.exe52⤵
- Executes dropped EXE
PID:2572 -
\??\c:\xllfllr.exec:\xllfllr.exe53⤵
- Executes dropped EXE
PID:2216 -
\??\c:\9btbhh.exec:\9btbhh.exe54⤵
- Executes dropped EXE
PID:2232 -
\??\c:\nthbhh.exec:\nthbhh.exe55⤵
- Executes dropped EXE
PID:1268 -
\??\c:\bbttbh.exec:\bbttbh.exe56⤵
- Executes dropped EXE
PID:544 -
\??\c:\vpjvp.exec:\vpjvp.exe57⤵
- Executes dropped EXE
PID:448 -
\??\c:\7djpv.exec:\7djpv.exe58⤵
- Executes dropped EXE
PID:1232 -
\??\c:\rflrxfl.exec:\rflrxfl.exe59⤵
- Executes dropped EXE
PID:1872 -
\??\c:\ffxxfrx.exec:\ffxxfrx.exe60⤵
- Executes dropped EXE
PID:608 -
\??\c:\lfxffrf.exec:\lfxffrf.exe61⤵
- Executes dropped EXE
PID:2120 -
\??\c:\nnbbtt.exec:\nnbbtt.exe62⤵
- Executes dropped EXE
PID:736 -
\??\c:\tnbtbh.exec:\tnbtbh.exe63⤵
- Executes dropped EXE
PID:1040 -
\??\c:\jvjjp.exec:\jvjjp.exe64⤵
- Executes dropped EXE
PID:1968 -
\??\c:\7jpjj.exec:\7jpjj.exe65⤵
- Executes dropped EXE
PID:1104 -
\??\c:\frfflrx.exec:\frfflrx.exe66⤵PID:1616
-
\??\c:\xlrfrll.exec:\xlrfrll.exe67⤵PID:2312
-
\??\c:\htbbnn.exec:\htbbnn.exe68⤵PID:1768
-
\??\c:\jdpvd.exec:\jdpvd.exe69⤵PID:3004
-
\??\c:\vjvpp.exec:\vjvpp.exe70⤵PID:2000
-
\??\c:\7rlrxfr.exec:\7rlrxfr.exe71⤵PID:2028
-
\??\c:\tnhhbb.exec:\tnhhbb.exe72⤵PID:1572
-
\??\c:\fxxxrxx.exec:\fxxxrxx.exe73⤵PID:2608
-
\??\c:\7llrrxl.exec:\7llrrxl.exe74⤵PID:2704
-
\??\c:\3bntht.exec:\3bntht.exe75⤵PID:1964
-
\??\c:\jdvdv.exec:\jdvdv.exe76⤵PID:2188
-
\??\c:\vjpvv.exec:\vjpvv.exe77⤵PID:2604
-
\??\c:\rllfrrx.exec:\rllfrrx.exe78⤵PID:2656
-
\??\c:\5tntbb.exec:\5tntbb.exe79⤵PID:1452
-
\??\c:\nbthnt.exec:\nbthnt.exe80⤵PID:2204
-
\??\c:\pdvjd.exec:\pdvjd.exe81⤵PID:1680
-
\??\c:\llfrrrf.exec:\llfrrrf.exe82⤵PID:2800
-
\??\c:\ttbbht.exec:\ttbbht.exe83⤵PID:2764
-
\??\c:\dvjjv.exec:\dvjjv.exe84⤵PID:1144
-
\??\c:\llfllrr.exec:\llfllrr.exe85⤵PID:2632
-
\??\c:\xlxxrrr.exec:\xlxxrrr.exe86⤵PID:1736
-
\??\c:\btbbhh.exec:\btbbhh.exe87⤵PID:576
-
\??\c:\hbnthb.exec:\hbnthb.exe88⤵PID:1820
-
\??\c:\ddpvd.exec:\ddpvd.exe89⤵PID:1108
-
\??\c:\3rfxffr.exec:\3rfxffr.exe90⤵PID:2952
-
\??\c:\rllxlxl.exec:\rllxlxl.exe91⤵PID:1456
-
\??\c:\dvpvd.exec:\dvpvd.exe92⤵PID:2116
-
\??\c:\dvdvd.exec:\dvdvd.exe93⤵PID:2152
-
\??\c:\fxlrfff.exec:\fxlrfff.exe94⤵PID:2968
-
\??\c:\5nntnb.exec:\5nntnb.exe95⤵PID:2052
-
\??\c:\ddvjv.exec:\ddvjv.exe96⤵PID:292
-
\??\c:\bbtttn.exec:\bbtttn.exe97⤵PID:2500
-
\??\c:\hnbbhh.exec:\hnbbhh.exe98⤵PID:1208
-
\??\c:\1vvdv.exec:\1vvdv.exe99⤵PID:1792
-
\??\c:\ffflfxl.exec:\ffflfxl.exe100⤵PID:3052
-
\??\c:\hbhhnn.exec:\hbhhnn.exe101⤵PID:1648
-
\??\c:\hhbbhb.exec:\hhbbhb.exe102⤵PID:2408
-
\??\c:\jdvpv.exec:\jdvpv.exe103⤵
- System Location Discovery: System Language Discovery
PID:896 -
\??\c:\vvpdd.exec:\vvpdd.exe104⤵PID:2256
-
\??\c:\fxflxxl.exec:\fxflxxl.exe105⤵PID:2148
-
\??\c:\xxxrlxl.exec:\xxxrlxl.exe106⤵PID:1420
-
\??\c:\nnnbnt.exec:\nnnbnt.exe107⤵PID:1944
-
\??\c:\nbntnn.exec:\nbntnn.exe108⤵PID:3004
-
\??\c:\nnntbh.exec:\nnntbh.exe109⤵PID:1604
-
\??\c:\pppdv.exec:\pppdv.exe110⤵PID:2860
-
\??\c:\dvjvj.exec:\dvjvj.exe111⤵PID:2960
-
\??\c:\3fflxfr.exec:\3fflxfr.exe112⤵PID:2608
-
\??\c:\fxfrfrx.exec:\fxfrfrx.exe113⤵PID:2184
-
\??\c:\bbthtb.exec:\bbthtb.exe114⤵PID:2904
-
\??\c:\tnntbh.exec:\tnntbh.exe115⤵PID:2684
-
\??\c:\3vjdp.exec:\3vjdp.exe116⤵PID:2604
-
\??\c:\dvdjj.exec:\dvdjj.exe117⤵PID:2732
-
\??\c:\fflrfxf.exec:\fflrfxf.exe118⤵PID:2644
-
\??\c:\xxlfxrx.exec:\xxlfxrx.exe119⤵PID:1908
-
\??\c:\hbhhnn.exec:\hbhhnn.exe120⤵
- System Location Discovery: System Language Discovery
PID:1680 -
\??\c:\thtthh.exec:\thtthh.exe121⤵PID:2420
-
\??\c:\jjjpv.exec:\jjjpv.exe122⤵PID:2888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-